Securing Your Wireless Internet Connection

It is a well known fact that wireless connections are by nature insecure.  Your chances of being snooped on and valuable data stolen from you is very high, even in the most secure setups.  It's even more likely in a public setting such as an internet cafe or a wireless hotspot.  That is why good solutions are needed to ensure that your wireless connections are as secure as they can be. 

Delete Files Permanently & Securely with Shred & SecureDelete

We all know that when you simply delete a file, it’s possible to recover it later. Sometimes this is useful, if you accidentally delete something important; but usually this is a problem, and you really want that file gone forever. This howto will explain how to delete a file in linux securely and permanently, so it can never be recovered.

Secure temporary files in Linux

On a typical Linux system there will be at least two, if not more, directories or partitions meant to hold temporary files. There is always the /tmp directory, and often a /var/tmp directory as well. With newer Linux kernels, there can also be /dev/shm, which is mounted using the tmpfs filesystem.

Secure your Network and Diagnose Problems with nmapFE: The Network Mapper Front-End

Nmap, or the Network Mapper, is a powerful command-line tool for diagnosing network problems, finding security vulnerabilities, and host of other uses. Intricate knowledge of its use is crucial to systems administrators, but its many options and scanning methods can be daunting to even the most experienced of end users. nmapFE, or the nmap Front End, is a graphical interface for nmap that makes it easy to use even the most powerful aspects of the network mapper, and can be a life-saver when you run into networking problems.

Celebrity advice on keeping your Linux desktop secure

One of the main reasons people move from Windows to Linux is the promise of greater security from malware on the Internet. Everyone knows you need to add extra security to try to keep a Windows desktop safe, but what do you have to do to accomplish the same thing on Linux? To answer that question, we asked a number of well-known Linux kernel hackers and a security expert for their thoughts on the matter.

How to Secure Ubuntu Linux

All operating systems need secured at some point, even open source operating systems. Securing your operating system can be very easy and beneficial as well. In Ubuntu Linux, as with all operating systems, it is recommended that you use a firewall or at least IP tables, as with the case with Linux distributions. However, there are other steps that also need to be taken to secure your system before you consider setting up a firewall.

Block SSH Login Attempts On Ubuntu

If you run an ssh server on your Ubuntu system, and allow password based authentication, then you’ll want to install DenyHosts. It watches the log files and blocks the IP address of those who fail to authenticate too many time. As always, while this article is Ubuntu oriented, the same basic procedure works on other distros.

How to Secure Ubuntu With AppArmor

AppArmor attempts to protect processes on the server or desktop from security threats. AppArmor enforces limits on what processes can access on the system. It attempts to restrict processes to those resources that the process requires to function only. AppArmor will not only define the system resources a program can access , it will also determine the privileges with which it can access those resources. To protect applications you will need to set up a security profile for each application that you want to protect.

Secure Your Connection With Open Source

Syndicate content